4.3
CVSSv2

CVE-2011-1062

Published: 23/02/2011 Updated: 17/08/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 450
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Multiple cross-site scripting (XSS) vulnerabilities in include/html/header.php in TaskFreak! 0.6.4 allow remote malicious users to inject arbitrary web script or HTML via the (1) sContext, (2) sort, (3) dir, and (4) show parameters in a save action to index.php; the (5) dir and (6) show parameters to print_list.php; and the (7) HTTP referer header to rss.php. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

taskfreak taskfreak\\! 0.6.4

Exploits

################################################################ TaskFreak! v064 Multiple Cross-Site Scripting Vulnerabilities Vendor: Stan Ozier Product web page: wwwtaskfreakcom Affected version: 064 (multi-user) Summary: TaskFreak! Original is a simple but efficient web based task manager written in PHP Desc: TaskFreak! suffer ...
source: wwwsecurityfocuscom/bid/46350/info TaskFreak! is prone to multiple cross-site scripting vulnerabilities because the application fails to sufficiently sanitize user-supplied input An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site ...
source: wwwsecurityfocuscom/bid/46350/info TaskFreak! is prone to multiple cross-site scripting vulnerabilities because the application fails to sufficiently sanitize user-supplied input An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site Th ...
source: wwwsecurityfocuscom/bid/46350/info TaskFreak! is prone to multiple cross-site scripting vulnerabilities because the application fails to sufficiently sanitize user-supplied input An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site This ...